Commit Graph

273429 Commits

Author SHA1 Message Date
christos e9c617f5ed regen 2020-01-23 17:37:03 +00:00
roy 532e639965 arp: find source address then target address when processing input
This fixes the case where another host having a duplicate ip address
starts using it right away without probing for it's availability.

While here, prefer ifatoia over a strict cast.
2020-01-23 17:27:35 +00:00
uwe 0dd4ecbf47 Avoid warning about dcbf, icbi first argument.
as(1) is not quite happy when RA=0 argument to these instructions is
spelled as %r0 and emits a warning.  Spell that argument as 0 to
placate it.  Same object code is generated.
2020-01-23 17:23:03 +00:00
ad 9ca3d43a4f NetBSD 9.99.42 - struct vnode changed. 2020-01-23 17:03:20 +00:00
pgoyette fccfbe317e Fix name of keyword so it will worwk correctly. :) 2020-01-23 16:34:12 +00:00
mlelstv e3867dfd7f Add the EC_GFp_nistp*_methods again 2020-01-23 12:55:09 +00:00
ad 3f1e3a85e0 Update a comment. 2020-01-23 12:35:23 +00:00
jmcneill 53f3380752 Add support for sharing legacy PCI interrupt sources. 2020-01-23 11:59:37 +00:00
ad b48e2f0077 #ifdef _KERNEL_OPT for previous 2020-01-23 11:17:09 +00:00
ad 29bbec1956 PAX_SEGVGUARD doesn't seem to work properly in testing for me, but at least
make it not cause problems:

- Cover it with exec_lock so the updates are not racy.
- Using fileassoc is silly.  Just hang a pointer off the vnode.
2020-01-23 10:21:14 +00:00
ad 3aeae772a2 exec_lock: declare it in the header, and mark with __cachline_aligned. 2020-01-23 10:05:44 +00:00
knakahara fe69926376 Fix PR security/54881. Pointed out by ohishi@IIJ, thanks. 2020-01-23 09:09:59 +00:00
knakahara 50fa1932a0 fix softint_disestablish() in wm_detach().
ok by msaitoh@n.o

XXX pullup-8, pullup-9
2020-01-23 07:49:57 +00:00
mrg ecf6466c63 add new random.c. builds for me. 2020-01-23 07:27:00 +00:00
martin 9a9189223f Fix the build: access_regs_set_unaligned_pc_* tests depend on availability
of gpregs
2020-01-23 06:17:21 +00:00
christos 42717e6807 new OpenSSL 2020-01-23 02:57:25 +00:00
christos 403eeac405 resolve conflicts 2020-01-23 02:54:53 +00:00
christos 4ce06407d8 Changes between 1.1.1c and 1.1.1d [10 Sep 2019]
*) Fixed a fork protection issue. OpenSSL 1.1.1 introduced a rewritten random
     number generator (RNG). This was intended to include protection in the
     event of a fork() system call in order to ensure that the parent and child
     processes did not share the same RNG state. However this protection was not
     being used in the default case.

     A partial mitigation for this issue is that the output from a high
     precision timer is mixed into the RNG state so the likelihood of a parent
     and child process sharing state is significantly reduced.

     If an application already calls OPENSSL_init_crypto() explicitly using
     OPENSSL_INIT_ATFORK then this problem does not occur at all.
     (CVE-2019-1549)
     [Matthias St. Pierre]

  *) For built-in EC curves, ensure an EC_GROUP built from the curve name is
     used even when parsing explicit parameters, when loading a serialized key
     or calling `EC_GROUP_new_from_ecpkparameters()`/
     `EC_GROUP_new_from_ecparameters()`.
     This prevents bypass of security hardening and performance gains,
     especially for curves with specialized EC_METHODs.
     By default, if a key encoded with explicit parameters is loaded and later
     serialized, the output is still encoded with explicit parameters, even if
     internally a "named" EC_GROUP is used for computation.
     [Nicola Tuveri]

  *) Compute ECC cofactors if not provided during EC_GROUP construction. Before
     this change, EC_GROUP_set_generator would accept order and/or cofactor as
     NULL. After this change, only the cofactor parameter can be NULL. It also
     does some minimal sanity checks on the passed order.
     (CVE-2019-1547)
     [Billy Bob Brumley]

  *) Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.
     An attack is simple, if the first CMS_recipientInfo is valid but the
     second CMS_recipientInfo is chosen ciphertext. If the second
     recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct
     encryption key will be replaced by garbage, and the message cannot be
     decoded, but if the RSA decryption fails, the correct encryption key is
     used and the recipient will not notice the attack.
     As a work around for this potential attack the length of the decrypted
     key must be equal to the cipher default key length, in case the
     certifiate is not given and all recipientInfo are tried out.
     The old behaviour can be re-enabled in the CMS code by setting the
     CMS_DEBUG_DECRYPT flag.
     (CVE-2019-1563)
     [Bernd Edlinger]

  *) Early start up entropy quality from the DEVRANDOM seed source has been
     improved for older Linux systems.  The RAND subsystem will wait for
     /dev/random to be producing output before seeding from /dev/urandom.
     The seeded state is stored for future library initialisations using
     a system global shared memory segment.  The shared memory identifier
     can be configured by defining OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID to
     the desired value.  The default identifier is 114.
     [Paul Dale]

  *) Correct the extended master secret constant on EBCDIC systems. Without this
     fix TLS connections between an EBCDIC system and a non-EBCDIC system that
     negotiate EMS will fail. Unfortunately this also means that TLS connections
     between EBCDIC systems with this fix, and EBCDIC systems without this
     fix will fail if they negotiate EMS.
     [Matt Caswell]

  *) Use Windows installation paths in the mingw builds

     Mingw isn't a POSIX environment per se, which means that Windows
     paths should be used for installation.
     (CVE-2019-1552)
     [Richard Levitte]

  *) Changed DH_check to accept parameters with order q and 2q subgroups.
     With order 2q subgroups the bit 0 of the private key is not secret
     but DH_generate_key works around that by clearing bit 0 of the
     private key for those. This avoids leaking bit 0 of the private key.
     [Bernd Edlinger]

  *) Significantly reduce secure memory usage by the randomness pools.
     [Paul Dale]

  *) Revert the DEVRANDOM_WAIT feature for Linux systems

     The DEVRANDOM_WAIT feature added a select() call to wait for the
     /dev/random device to become readable before reading from the
     /dev/urandom device.

     It turned out that this change had negative side effects on
     performance which were not acceptable. After some discussion it
     was decided to revert this feature and leave it up to the OS
     resp. the platform maintainer to ensure a proper initialization
     during early boot time.
     [Matthias St. Pierre]
2020-01-23 02:47:58 +00:00
pgoyette 320866888c Since this used to be part of the compat_50 module, make it depend on
compat_50 rather than compat_60 module.
2020-01-22 23:41:29 +00:00
jmcneill c1484821ef dwc_mmc fixes:
- Rockchip uses a different SDIO int bit, so take this into consideration
 - Avoid unnecessary resets and always wait for resets to complete
 - kpause instead of delay while holding spinlock
 - Do not attempt autostop for SD_IO_RW_EXTENDED commands
 - Allow for sub-blklen byte counts for single block transfers
2020-01-22 23:19:11 +00:00
pgoyette 95b31e2877 Enhance debug message when autoloading a module. Identify the pid
of the process that triggered the autoload, as well as its p_comm
and the status.

This is only triggered if you've requested DEBUG messages by setting
the kern.module.verbose sysctl(8) variable.
2020-01-22 22:39:27 +00:00
macallan 69b4136094 enable CPU speed / voltage control via GPIOs and/or DFS
should work on most *Book G4
( notable exception - TiBooks. They use a completely different mechanism )
2020-01-22 22:29:28 +00:00
sjg b24780ba6c Rename guard to avoid that already used by Linux filemon.h
Reviewed by: riastradh
2020-01-22 22:10:36 +00:00
jmcneill ced685e422 Fix DWC_MMC_INT_SDIO_INT bit 2020-01-22 21:59:10 +00:00
uwe b453cdfc13 Switch powerpc to GCC 8 again now that alloca() is fixed.
PR port-macppc/54827
2020-01-22 21:46:06 +00:00
uwe 109609bc84 Do not override STACK_BOUNDARY in netbsd.h
sysv4.h already overrides PREFERRED_STACK_BOUNDARY b/c SYSV ABI
requires 16 bytes alignment for %sp anyway and so we already get that
for free.

More importantly this also fixes alloca() in GCC 8, that was somehow
confused by that STACK_BOUNDARY value we had and created a buffer that
overlapped top local variable slots.
2020-01-22 21:39:43 +00:00
mlelstv 139ddeeef5 Adapt to changed 64bit vchiq interface. 2020-01-22 21:21:24 +00:00
sevan 43eb56c7ac Add Terry Jones, once clarified who wasn't the messiah, but a very naughty boy 2020-01-22 21:07:56 +00:00
sjg de07d5747c Check for filemon valid.
If meta_needed() returns FALSE, mfp and filemon will be NULL
in which case we should not call filemon_*().
2020-01-22 21:04:29 +00:00
roy b433cf8862 route: address flags are more useful than interface flags for address msgs 2020-01-22 19:22:06 +00:00
mlelstv a7b0ae37b0 align with upstream for 64bit compatibility. 2020-01-22 19:15:49 +00:00
roy cdc408b51e route: Decode the correct flags for interface address messages 2020-01-22 17:55:41 +00:00
skrll 4a581442d1 Fixup a comment 2020-01-22 17:15:53 +00:00
ad d19a121458 Bump UBC defaults on sparc64 & aarch64, which already have a large pager_map. 2020-01-22 16:59:37 +00:00
ad e5b2948d82 Move the UBC defaults into vmparam.h 2020-01-22 16:52:46 +00:00
mgorny ac78ffd6ff Fix using gcc's unwind.h 2020-01-22 16:07:40 +00:00
mgorny 26a48dd100 Install gcc's unwind.h instead of libexecinfo's
The prototypes in libexecinfo's unwind.h do not match those commonly
used (e.g. by gcc, clang, GNU libunwind, LLVM libunwind...), causing
C++ programs to fail to build on type mismatches (e.g. compiler-rt,
libc++abi).  Rather than providing our own header, reuse the one
included in gcc.
2020-01-22 15:10:31 +00:00
thorpej c718a72d76 I overlooked the esh(4) man page when removing HIPPI support; remove it
now.  Thanks maxv@ for noticing and pointing it out.
2020-01-22 14:01:50 +00:00
ad 8e88ef3f82 - DIAGNOSTIC: check for leaked kernel_lock in mi_switch().
- Now that ci_biglock_wanted is set later, explicitly disable preemption
  while acquiring kernel_lock.  It was blocked in a roundabout way
  previously.

Reported-by: syzbot+43111d810160fb4b978b@syzkaller.appspotmail.com
Reported-by: syzbot+f5b871bd00089bf97286@syzkaller.appspotmail.com
Reported-by: syzbot+cd1f15eee5b1b6d20078@syzkaller.appspotmail.com
Reported-by: syzbot+fb945a331dabd0b6ba9e@syzkaller.appspotmail.com
Reported-by: syzbot+53a0c2342b361db25240@syzkaller.appspotmail.com
Reported-by: syzbot+552222a952814dede7d1@syzkaller.appspotmail.com
Reported-by: syzbot+c7104a72172b0f9093a4@syzkaller.appspotmail.com
Reported-by: syzbot+efbd30c6ca0f7d8440e8@syzkaller.appspotmail.com
Reported-by: syzbot+330a421bd46794d8b750@syzkaller.appspotmail.com
2020-01-22 13:19:33 +00:00
ad 41d7da0e5e Add a comment. 2020-01-22 12:44:54 +00:00
skrll fcb8be3594 #ifdef whack-a-mole for the pmap_maxproc_set functionality 2020-01-22 12:23:12 +00:00
ad 20f33b0230 Catch a leaked hold of kernel_lock sooner with DIAGNOSTIC and make the
message a bit more informative.
2020-01-22 12:23:04 +00:00
jmcneill 4e19d93e81 Write pbdma timeout regs during initialisation on GK208B, GK208, and GM107.
Based on the following upstream commit:
79bb4b617f
2020-01-22 11:38:54 +00:00
skrll b99dfc1784 Oops, the cast is required 2020-01-22 10:52:35 +00:00
uwe 10180bec9c Switch powerpc back to GCC 7 until we fix alloca() PR port-macppc/54827
ok mrg@
2020-01-22 08:32:33 +00:00
jmcneill 84160ba1d4 Fix PHYS_TO_BUS_MEM and BUS_MEM_TO_PHYS on arm and aarch64 2020-01-22 07:53:45 +00:00
mrg 4ea65bdb69 save the new current level when set by the user.
stops PBP display from going back to default brightness after
dpms, etc.

ok jmcneill.
2020-01-22 07:29:23 +00:00
martin e7acfd1971 Clamp FAT partition size to 32 bit byte offsets to make the code small
enough to fit.
2020-01-22 06:13:18 +00:00
martin 39cd2eeea8 To support big partitions we need to make sure all byte offsets are calculated
in 64 bit arithmetic. Pointed out by Rob Newberry.
Unfortunately this causes a code size increase breaking some boot blocks,
so conditionalize it and use 32 bit arithmetic if SA_DOSFS_NO_BIG_PART_SUPPORT
is defined.
2020-01-22 06:11:28 +00:00
thorpej 9c0a409d68 Static'ify. 2020-01-22 03:48:10 +00:00